# Inbit Messenger 4.9.0 SEH溢出漏洞
## 概述
Inbit Messenger 4.6.0 至 4.9.0 版本存在远程基于栈的缓冲区溢出漏洞,攻击者无需身份验证即可通过发送特制网络数据包触发漏洞。
## 影响版本
4.6.0 ≤ 版本 < 4.9.0
## 细节
漏洞存在于消息应用的网络请求处理组件中。攻击者可构造恶意载荷,通过网络发送畸形数据包,导致栈缓冲区溢出,覆盖 Structured Exception Handler (SEH) 结构,从而控制程序执行流。
## 影响
未经认证的远程攻击者可利用该漏洞在目标系统上执行任意代码(如注入并运行shellcode),完全控制受影响的Windows系统。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Inbit Messenger v4.9.0 - Unauthenticated Remote SEH Overflow - Windows remote Exploit -- 🔗来源链接
标签:exploit
神龙速读:
- **EDB-ID**: 51126
- **CVE**: N/A
- **Author**: a-rey
- **Type**: Remote
- **Platform**: Windows
- **Date**: 2023-03-29
- **Vulnerable App**: Inbit Messenger v4.9.0
- **Exploit Title**: Inbit Messenger v4.9.0 - Unauthenticated Remote SEH Overflow
- **Date**: 2022-08-11
- **Vendor Homepage**: http://www.inbit.com/support.html
- **Software Link**: http://www.softsea.com/review/Inbit-Messenger-Basic-Edition.html
- **Version**: v4.6.0 - v4.9.0
- **Tested on**: Windows XP SP3, Windows 7, Windows 10
- **Exploit Write-Up**: https://github.com/a-rey/exploits/blob/main/writeups/Inbit_Messenger/v4.6.0/writeup.md
- **Code Language**: Python
标题: exploits/writeups/Inbit_Messenger/v4.6.0/writeup.md at main · a-rey/exploits · GitHub -- 🔗来源链接
标签:technical-description
标题: Inbit Messenger 4.9.0 - Unauthenticated Remote SEH Overflow | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
## 漏洞关键信息
### 漏洞名称
Inbit Messenger 4.9.0 - Unauthenticated Remote SEH Overflow
### 严重性
CRITICAL
### 发布日期
2023-01-13
### 影响版本
- Inbit Messenger <= 4.9.0
### 漏洞类型
CVE-2023-54330: CWE-121 Stack-based Buffer Overflow
### CVSS评分
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
### 参考链接
- [ExploitDB-51126](#)
- [ Archived Software Download Page](#)
- [Exploit Write-Up](#)
### 描述
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.